Skip to content

Commit d3c9508

Browse files
authored
Merge pull request #2416 from meganbradley/meganbradley/docutune-autopr-20250111-054319-1400740-ignore-build
[BULK] - DocuTune remediation - Red Tiger deprecation (part 5)
2 parents fae21fe + dde3691 commit d3c9508

10 files changed

+10
-10
lines changed

defender-office-365/migrate-to-defender-for-office-365.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -29,7 +29,7 @@ appliesto:
2929
If you already have an existing third-party protection service or device that sits in front of Microsoft 365, you can use this guide to migrate your protection to Microsoft Defender for Office 365. Defender for Office 365 gives you the benefits of a consolidated management experience, potentially reduced cost (using products that you already pay for), and a mature product with integrated security protection. For more information, see [Microsoft Defender for Office 365](https://www.microsoft.com/security/business/threat-protection/office-365-defender).
3030

3131
Watch this short video to learn more about migrating to Defender for Office 365.
32-
> [!VIDEO https://www.microsoft.com/en-us/videoplayer/embed/RWRwfH]
32+
> [!VIDEO https://learn-video.azurefd.net/vod/player?id=41c64de1-92ce-4ff6-9660-557a4d6f74f1]
3333
3434
This guide provides specific and actionable steps for your migration, and assumes the following facts:
3535

defender-office-365/quarantine-admin-manage-messages-files.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -43,7 +43,7 @@ You view and manage quarantined messages in the Microsoft Defender portal or in
4343

4444
Watch this short video to learn how to manage quarantined messages as an admin.
4545

46-
> [!VIDEO https://www.microsoft.com/en-us/videoplayer/embed/RWGGPF]
46+
> [!VIDEO https://learn-video.azurefd.net/vod/player?id=038517f8-6eb7-46b8-b6cc-034a2c45ae06]
4747
4848
[!INCLUDE [MDO Setup guide](../includes/mdo-setup-guide.md)]
4949

defender-office-365/reports-defender-for-office-365.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -47,7 +47,7 @@ The rest of this article describes the reports that are exclusive to Defender fo
4747
4848
Watch this short video to learn how you can use reports to understand the effectiveness of Defender for Office 365 in your organization.
4949

50-
> [!VIDEO https://www.microsoft.com/videoplayer/embed/RWBkxB]
50+
> [!VIDEO https://learn-video.azurefd.net/vod/player?id=44f1f230-ca91-46e1-b1d0-5015936751d3]
5151
5252
## Safe Attachments file types report
5353

defender-office-365/safe-links-about.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -43,7 +43,7 @@ In organizations with Microsoft Defender for Office 365, Safe Links scanning pro
4343

4444
Watch this short video on how to protect against malicious links with Safe Links in Microsoft Defender for Office 365.
4545

46-
> [!VIDEO https://www.microsoft.com/en-us/videoplayer/embed/RWGzjb]
46+
> [!VIDEO https://learn-video.azurefd.net/vod/player?id=377095d3-f1a2-41c3-b04f-1eb2387affc1]
4747
4848
> [!NOTE]
4949
> Although there's no default Safe Links policy, the **Built-in protection** preset security policy provides Safe Links protection in e-mail messages, Microsoft Teams, and files in supported Office apps to all recipients for customers that have at least one Defender for Office 365 license (users who aren't defined in the Standard or Strict preset security policies or in custom Safe Links policies). For more information, see [Preset security policies in EOP and Microsoft Defender for Office 365](preset-security-policies.md). You can also create Safe Links policies that apply to specific users, group, or domains. For instructions, see [Set up Safe Links policies in Microsoft Defender for Office 365](safe-links-policies-configure.md).

defender-office-365/step-by-step-guides/track-and-respond-to-emerging-threats-with-campaigns.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -46,7 +46,7 @@ A campaign might be short-lived, or could span several days, weeks, or months wi
4646
4747
## Watch the *Exploring campaign views* video
4848

49-
> [!VIDEO https://www.microsoft.com/en-us/videoplayer/embed/RWGBL8]
49+
> [!VIDEO https://learn-video.azurefd.net/vod/player?id=0ed63ec3-48b1-4a6b-88d3-d3bb27b22c55]
5050
5151
## Investigating a suspicious email campaign using threat reports
5252

defender-office-365/submissions-admin.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -51,7 +51,7 @@ When admins or users submit messages to Microsoft for analysis, we do the follow
5151
5252
Watch this short video to learn how to use admin submissions in Microsoft Defender for Office 365 to submit messages to Microsoft for evaluation.
5353

54-
> [!VIDEO https://www.microsoft.com/en-us/videoplayer/embed/RWBLPn]
54+
> [!VIDEO https://learn-video.azurefd.net/vod/player?id=9357652e-0c17-49ab-8299-36838c3532aa]
5555
5656
For more information about how **users** can submit messages and files to Microsoft, see [Report messages and files to Microsoft](submissions-report-messages-files-to-microsoft.md).
5757

defender-office-365/submissions-outlook-report-messages.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -161,4 +161,4 @@ To review messages that users have reported to Microsoft, admins can use the **U
161161

162162
Admins can watch this short video to learn how to use Microsoft Defender for Office 365 to easily investigate user reported messages. Admins can determine the contents of a message and how to respond by applying the appropriate remediation action.
163163

164-
> [!VIDEO https://www.microsoft.com/en-us/videoplayer/embed/RWBHof]
164+
> [!VIDEO https://learn-video.azurefd.net/vod/player?id=f420f4a0-56a3-4054-8963-6eb72403f875]

defender-office-365/submissions-report-messages-files-to-microsoft.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -32,7 +32,7 @@ Wondering what to do with suspicious email messages, URLs, email attachments, or
3232
In addition, admins in Microsoft 365 organizations with Microsoft Defender for Endpoint also have several methods for reporting files.
3333

3434
Watch this video that shows more information about the unified submissions experience.
35-
> [!VIDEO https://www.microsoft.com/en-us/videoplayer/embed/RE50HhM]
35+
> [!VIDEO https://learn-video.azurefd.net/vod/player?id=65c688e4-8b79-4a39-a731-ddbffa053448]
3636
3737
## Report suspicious email messages to Microsoft
3838

defender-office-365/threat-explorer-threat-hunting.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -38,7 +38,7 @@ Threat Explorer or Real-time detections allow you to take the following actions:
3838

3939
Watch this short video to learn how to hunt and investigate email and collaboration-based threats using Defender for Office 365.
4040

41-
> [!VIDEO https://www.microsoft.com/videoplayer/embed/RWyPRU]
41+
> [!VIDEO https://learn-video.azurefd.net/vod/player?id=62857c41-a1ad-41cb-a2b2-5bfe2cb4be77]
4242
4343
> [!TIP]
4444
> Advanced hunting in Microsoft Defender XDR supports an easy-to-use query builder that doesn't use the Kusto Query Language (KQL). For more information, see [Build queries using guided mode](/defender-xdr/advanced-hunting-query-builder).

defender-office-365/trial-user-guide-defender-for-office-365.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -37,7 +37,7 @@ Defender for Office 365 helps organizations secure their enterprise by offering
3737

3838
In addition to the detection of advanced threats, the following video shows how the SecOps capabilities of Defender for Office 365 can help your team respond to threats:
3939

40-
> [!VIDEO https://www.microsoft.com/videoplayer/embed/RWMmIe]
40+
> [!VIDEO https://learn-video.azurefd.net/vod/player?id=29ff5c90-7b71-468c-92b9-d1d8ca9ee8fa]
4141
4242
### Audit mode vs. blocking mode for Defender for Office 365
4343

0 commit comments

Comments
 (0)